包含标签:Java 的文章
-
Complete example tutorial of spring MVC + fastjason + Hibernate validator integration
1: Hibernate validator Foundation 1. Introduction: By using annotation annotations to impose constraints on classes o…… -
An instance of mybatis preventing SQL injection
SQL injection is a common attack method, which is familiar to everyone. The attacker enters some strange SQL fragments…… -
Implementation of ordered array merging algorithm for merging algorithm
Implementation of ordered array merging algorithm for merging algorithm A simple ordered array merging algorithm: writ…… -
Java gets all key value pair instances in JSON
As follows: The above example of Java obtaining all key value pairs in JSON is all the content shared by Xiaobian. I h…… -
Analysis of spring declarative transaction management
Cutting edge: through in-depth study of spring transaction management, this article will not do an example, but specif…… -
How to use onetomany in Java
Write at the beginning Onetomany declared using jhipster has no mapping relationship with many's dto in one's dto. In …… -
Solution to list and stream de duplication in Java
problem At present, the Internet technology is mature, and more and more tend to be decentralized, distributed and str…… -
Method of checking QQ number by Java regular expression
Java regular expression Regular expressions define the pattern of strings. Regular expressions can be used to search, …… -
Understanding of hibernate and mybatis in Java Web learning tutorial
preface In Java Web development, the most classic is the SSH framework combination and SSM framework combination. Now …… -
Spring boot integrates Druid database connection pool
1. Preface Druid database connection pool is open source by Alibaba. It is known as the best database connection pool …… -
Java convolutional neural network (Introduction to cupcnn)
preface In machine learning, convolutional neural network is a deep feedforward artificial neural network, which has b…… -
Java custom log output file (log4j log file outputs multiple custom log files)
Log4j outputs multiple custom log files. If you need to output independent log files in practical application, how can…… -
How to write the map parameter of the list array passed in by mybatis
Foreach is mainly used to build in conditions. It can iterate a set in SQL statements. The attributes of foreach eleme…… -
Spring boot cross domain access implementation code
The current version of spring is 4.3 nine PS: spring boot server side settings allow cross domain access Updated on Ap…… -
Mybatis dynamically inserts the instance code of the list parameter passed in
The example code of mybatis dynamically inserting a list is as follows: The example code of the list parameter passed …… -
Parsing the method of mybatis continuously passing multiple parameters
Mybatis is an excellent persistence layer framework that supports common SQL queries, stored procedures and advanced m…… -
Usage of mybatis passing multiple parameters for SQL query
PS: there are two ways to pass multiple parameters in ibatis3: one is to use Java Map, the other is to use JavaBeans. …… -
Detailed explanation of mybatis method to prevent SQL injection
SQL injection is a very simple attack, but it is still very common today. The reason is no patch for stupid. Why? Let'…… -
Explain in detail how to use spring security to solve CSRF problems
CSRF introduction CSRF (Cross Site Request Forgery), Chinese Name: Cross Site Request Forgery, also known as one click…… -
Complete example tutorial of spring MVC + fastjason + swagger integration
Basic part 1. Introduction to fastjason Fastjson is a Java library that can be used to convert Java objects into JSON …… -
How to use MySQL for Java Web Learning in the project
preface Awkward: access denied for user 'root' @'localhost 'using password yes Sometimes, when connecting to MySQL dat…… -
The list object list in Java implements the method of de duplication or retrieval and sorting
preface Because I have encountered several list de duplication and sorting during the interview, I feel it necessary t…… -
Spring boot uses druid and monitoring configuration methods
The default data source of spring boot is: org apache. tomcat. jdbc. pool. DataSource Druid is the best database conne…… -
Java uses regular expressions to determine mobile phone numbers
This article describes how Java uses regular expressions to judge mobile phone numbers. Share with you for your refere…… -
Implementation code of Java calling Chuang LAN 253 SMS verification code
Java calling SMS interface API based on Chuang LAN 253 SMS service platform summary The above is the implementation co…… -
A simple online chat function based on java socket (I)
Recently, I did a project, in which there was a demand for online web page communication. I haven't written code for a…… -
Sample code of using spring security to build permission system in spring boot
Spring security is a security framework that can provide declarative security access control solutions for spring base…… -
Java implementation of simple LAN chat function
This example shares the specific code of Java using UDP mode to write chat program for your reference. The specific co…… -
Detailed explanation of Java code annotation specification
Code with comments is very important for program developers. With the development of technology, programmers must be r…… -
In depth analysis of lambda expression of new features of jdk8
The first time I contacted lambda expression was in typescript (superset of JavaScript). At that time, it was used out…… -
Sample code of spring integrating quartz distributed scheduling
preface In order to ensure high availability and high concurrency of applications, multiple nodes are generally deploy…… -
Advanced specification of Java programming format
As a developer, we should have strict code specifications. To this end, I summarized some code specification cases. ca……
